wavpack is vulnerable to arbitrary code execution. A heap-based buffer over-read in the ParseDsdiffHeaderConfig
function in cli/dsdiff.c
allows a remote attacker to execute arbitrary code on the system or cause a denial-of-service via a malicious DSDIFF file.
packetstormsecurity.com/files/155743/Slackware-Security-Advisory-wavpack-Updates.html
bugs.debian.org/cgi-bin/bugreport.cgi?bug=889559
github.com/dbry/WavPack/commit/36a24c7881427d2e1e4dc1cef58f19eee0d13aec
github.com/dbry/WavPack/issues/28
seclists.org/bugtraq/2019/Dec/37
usn.ubuntu.com/3578-1/
www.debian.org/security/2018/dsa-4125